Next Article in Journal
A New Deep Model for Detecting Multiple Moving Targets in Real Traffic Scenarios: Machine Vision-Based Vehicles
Next Article in Special Issue
Performance Analysis of NB-IoT Uplink in Low Earth Orbit Non-Terrestrial Networks
Previous Article in Journal
Design and Locomotion Study of Two-DOF Actuator Driven by Piezoelectric–Electromagnetic Hybrid Mode
Previous Article in Special Issue
An Enhanced Decoding Algorithm for Coded Compressed Sensing with Applications to Unsourced Random Access
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analytical Model of ALOHA and Time- and Frequency-Asynchronous ALOHA with Forward Error Correction for IoT Systems

German Aeropsace Center (DLR), Institute of Communications and Navigation, 82234 Weßling, Germany
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(10), 3741; https://doi.org/10.3390/s22103741
Submission received: 4 April 2022 / Revised: 2 May 2022 / Accepted: 11 May 2022 / Published: 14 May 2022
(This article belongs to the Special Issue Massive Machine-Type Communications towards 6G)

Abstract

:
The blooming of internet of things (IoT) services calls for a paradigm shift in the design of communications systems. Short data packets sporadically transmitted by a multitude of low-cost low-power terminals require a radical change in relevant aspects of the protocol stack. For example, scheduling-based approaches may become inefficient at the medium access (MAC) layer, and alternatives such as uncoordinated access policies may be preferred. In this context random access (RA) in its simplest form, i.e., additive links on-line Hawaii area (ALOHA), may again become attractive as also proved by a number of technologies adopting it. The use of forward error correction (FEC) can improve its performance, yet a comprehensive analytical model including this aspect is still missing. In this paper, we provide a first attempt by deriving exact expressions for the packet loss rate and spectral efficiency of ALOHA with FEC, and extend the result also to time- and frequency-asynchronous ALOHA aided by FEC. We complement our study with extensive evaluations of the expressions for relevant cases of study, including an IoT system served by low-Earth orbit (LEO) satellites. Non-trivial outcomes show how time- and frequency-asynchronous ALOHA particularly benefit from the presence of FEC and become competitive with ALOHA.

1. Introduction

The broad topic of internet of things (IoT) communications is increasingly gathering industrial and research interest. Not only is IoT traffic predicted to become predominant in future wireless systems, but also a blooming number of disruptive application areas are posing accents on different and sometimes opposing performance metrics: while classical communications deal with the spectrum-sharing of few data-rate hungry terminals that typically have predictable resource requirements, the IoT traffic shifts the paradigm of communications. A large population of, sometimes, low-cost and low-power devices need to share the spectrum while sending small data packets in a very sporadic and unpredictable or event-driven way. Emerging use cases relying totally or in part on IoT traffic range from smart agriculture [1] to industry 4.0 [2], from environmental monitoring [3] to logistics [4] and the smart city [5]. In the first area, the possibility to automatically monitor both animals and plants can improve their well-being, as well as increase the production or harvest. The installation of smart sensors and actuators inside the factory of the future allows the automatic monitoring of goods production. Robots and automated machines can be interconnected so as to enhance their capabilities and allow complex tasks. Not only autonomous driving but also the support of remote monitoring will revolutionize logistics, enabling for example real-time status checks on the moving vehicles as well as automatic anomaly detection. The deployment of smart sensors in the environment opens up to a plurality of services. Alerting systems may be used to identify fire outbreaks, flooding, earthquakes, and all other types of disasters. The possibility to attach smart sensors to every infrastructure in the smart city, enables us to bring city monitoring to a whole new level. Infrastructures including the energy, water, gas and heating supply networks could be automatically monitored. Not only that, but also mobile communication infrastructure, roads, security systems, buildings can all be integrated and monitored.
The paradigm shift posed by IoT traffic has a deep impact on the entire protocol stack and especially the physical and medium access (MAC) layers require dedicated tailoring. In particular, short packet transmission calls for efficient short codes able to counteract the channel effects and multi-user interference and that are amenable to easing channel estimation [6]. In fact, the use of data-aided channel estimation may result in an unacceptable waste of resources, especially when the information to be sent is very small, for example as low as 100 bits. Traditional scheduling-based medium access methods become inefficient when sporadic transmission of short packets takes place. The overhead to allocate—possibly dynamically—the resources for a vast population of terminals where only a small and variable fraction is active at a time, may become unacceptably large and can even overcome the resources needed for data transmission.
In this context, random access (RA) protocols emerge as valid alternatives thanks to their flexibility regarding the number of supported users, and dispensable allocation of pre-defined resources [7]. Uncoordinated transmissions have the benefit of flexibility and require no scheduling overhead at the expense of rising multi-user interference. In its simplest form, also known as the additive links on-line Hawaii area (ALOHA) protocol [8], nodes are permitted to send their message immediately upon generation, regardless of the channel activity. If packets are involved in a collision, randomized retransmissions are utilized to resolve contention. The first extension to ALOHA has been proposed few years later under the name of slotted ALOHA (SA) [9]. The simple yet brilliant idea to let users access the medium only in a slotted fashion drastically improves the performance. Upon the generation of a packet, the node is required to wait until a new time slot starts before transmission is allowed. The proactive transmission of multiple copies of the same physical layer packet has been explored as a mean to improve the efficiency of the access policy. The diversity slotted ALOHA protocol [10] is shown to improve the relevant metrics such as packet loss rate (probability that a packet is not successfully received) and throughput (the average aggregate number of packets per packet duration successfully received), but unfortunately only for lightly loaded channels. When packet transmissions are sufficiently sporadic, sending multiple copies of the same data unit on the channel increases the probability that at least one is received successfully. On the other hand, when the average number of packets generated per unit of time increases beyond a threshold, replicating packets on the channel becomes detrimental due to the increase in multi-user interference. The breakthrough has been achieved when the replication of packets at the physical layer has been coupled with successive interference cancellation (SIC) at the receiver. A relevant example is the contention resolution diversity slotted ALOHA (CRDSA) protocol [11]: whenever a packet is successfully recovered, the receiver is able to retrieve the time instances of the transmitted packet copies and remove their interference of all transmissions. This operation may reduce the interference affecting other data units and possibly enable their recovery. The use of SIC opened a new research wave in the context of RA protocols and several extensions have been proposed in the recent past, that can be collected under the name of modern random access [12]. A number of enhancements for CRDSA have been proposed where the number of packet copies is drawn from a common, optimized, probability mass function [13,14,15]. The observation that SIC can be well modeled as a peeling process over a graph—as first observed in [13]—naturally enables the exploitation of tools borrowed from codes on graphs [16]. The throughput of a coordinated multiple-access scheme can be achieved under asymptotic assumptions (maximum number of packet copies and delay among them grows very large) for the destructive collision channel, as proved in [17]. The exploitation of SIC in RA continued well beyond CRDSA and included works such as [18,19]. The former merged the use of contention resolution tree algorithms [20] with interference cancellation, while the latter addressed the case in which the number of packet copies to be transmitted is not set a-priori but is dynamically adapted so as to reach a target throughput. Extensions that include interference cancellation for both ALOHA and spread spectrum ALOHA has been proposed in recent literature as well. In particular, contention resolution ALOHA (CRA) [21] proposed the use of replicas transmitted uniformly at random with no slot boundaries but within a MAC frame. Later, CRA has been extended by the use of selection- and maximal-ratio combining in [22]. In [23] the MAC frame synchronization is eliminated reducing the synchronization requirements on terminals. In [24], spread spectrum ALOHA is enhanced by the adoption of SIC at the receiver. Most of the modern random access protocols listed have been initially investigated assuming either the destructive collision channel model or a model for decoding based on a threshold. One of their main advantages is their analytically tractability, but it has to be mentioned that a real error correcting code has a non-negligible impact on the behavior of such schemes. In order to extend the evaluation beyond the destructive collision channel, the authors of [25,26,27] used a polynomial interpolation of the additive white gaussian noise (AWGN) channel code block error rate to determine when packets can be successfully decoded. This approach is exploited to analyze enhanced-spread spectrum ALOHA (E-SSA) in [25], CRDSA in [26] and irregular repetition slotted ALOHA (IRSA), coded slotted ALOHA (CSA) in [27].
The need for energy efficient uncoordinated multiple access solutions for IoT communications called for exploring information theoretic limits, and has been addressed in a recent work by Polyanskiy [28]. The finite-length achievability random coding bound to the massive random access problem [28]—later improved in [29]—opened the door to a new and flourishing wave of interest in RA solutions. Two main classes arise as promising novel attempts: the first concerns itself with compressed sensing-based solutions represented by works such as [30,31,32,33,34,35,36,37], while the second class relies on conventional channel code-based schemes characterized by works such as [38,39,40,41,42,43,44,45]. By no means we consider to have given an exhaustive listing of each class. The key aspect addressed in the aforementioned works is to reduce the decoding complexity. The authors in [30] propose an algorithm employing binary chirp coding amenable of low-complexity decoding. Vem and co-authors [31] solve the complexity issue by following a divide and conquer idea, further expanded on in [32] and in [34,35]. Exploring alternatives to reduce transmitter complexity, Truhachev and co-authors [33] propose a modification of [31] leveraging spreading techniques. In the second class of solutions, Ordentlich and Polyanskiy [38] propose the use of a time-slotted scheme and a receiver based on the concatenation of an inner binary code with an outer code. In the quest to improve the performance of the scheme in [38], a single-user Polar decoder augmented with SIC is proposed in [39]. Pradhan and co-authors [40] take an alternative path by adopting the use of random spreading and a polar code. In [43] they extend their work by enabling soft-input soft-output minimum means square error estimation. Zheng and co-authors, in [41], build upon [40] by using sparse spreading, where codewords are zero-padded and interleaved based on a portion of the message to be transmitted. Tanc and Duman [42] explore the use of convolutional coding together with random signatures. Han and co-authors in [44] also split the message into two parts and adopt sparse spreading with index modulation as one component code, while the other is protected with a tail biting convolutional code. Finally, Ahmadi and Duman in [45] propose an extension of [40] by letting users transmit with different power levels. An optimization problem is defined to identify the required number of power levels and their values.

1.1. Main Contributions and Structure of the Paper

Despite the several enhancements proposed in the recent past, ALOHA and SA, with minor variations, are still adopted in the current mobile communication standard for the log-on procedure [46] as well as in a number of IoT communication technologies as, for example, SigFox [47] and LoRaWAN [48]. The use of the destructive collision channel, i.e., collision free packets are retrieved with probability one, while packets involved in a collision are always regarded as lost, is a viable physical layer abstraction for SA, but its use in ALOHA becomes unconvincing. In fact, the presence of forward error correction (FEC), yields to partial protection against not only the effects of the channel but also against some level of multi-user interference. Since in ALOHA most of the collisions are only partial, regarding all of them as destructive may be implausible. Interestingly, to the authors’ knowledge, an analytical model able to capture the beneficial impact of FEC on the ALOHA protocol is still missing. Along this line of research we tried to close this gap and in particular we focused on the following aspects:
  • We characterize the ALOHA protocol with an analytical model able to include the effect of FEC. We rely on a decoding condition based on a threshold which is function of the code rate and assume a capacity achieving channel code. Under the assumption of perfect power control, we are able to derive exact expressions for both the packet loss rate and the spectral efficiency;
  • We explore a time- and frequency-asynchronous ALOHA scheme protected with FEC and extend the analytical analysis to this case as well. Packets are allowed to be sent not only whenever generated from higher layers, but are also randomized in frequency within a given channel bandwidth;
  • We compare the two schemes, i.e., ALOHA and time and frequency ALOHA with FEC, shedding light on the still unexplored tradeoffs. While time and frequency ALOHA under the destructive collision channel is known to under perform compared to ALOHA [49,50], when packets are instead protected by FEC, the two schemes have a comparable performance;
  • Finally, we consider a practical low-Earth orbit (LEO) communication system serving an IoT application and mimic the performance of SigFox compared to a similar system where packets are protected by FEC.
The remainder of this paper is structured as follows. After introducing the system model in Section 2, we provide in Section 3 the analytical analysis for both ALOHA (Section 3.1) and time and frequency ALOHA (Section 3.2), both aided by FEC. The numerical results are presented and discussed in Section 4, highlighting some fundamental tradeoffs and comparing the effectiveness of ALOHA and time and frequency ALOHA. Finally, Section 5 draws final remarks and offers some relevant open issues and future research directions.

1.2. Notation

We denote random variables by uppercase seriffed letters, while we refer to their realizations in lowercase, e.g., X and x. Vectors are denoted with bold lowercase letters, e.g., x . The expectation operator is denoted as E [ · ] and the real and imaginary part operators are represented with { · } and { · } , respectively. Units of measurements for variables and constants are introduced by the square brackets notation [ · ] and we use the short form b for referring to bits, pk for packets and sym for symbols.

2. System Model and Preliminaries

In our contribution we will focus on the return uplink of a satellite communication system serving low-cost low-power IoT nodes. In this regard, terminals are equipped with a single-antenna transmitter-only radio link. We assume that the devices access the common wireless medium following the ALOHA RA policy [51], i.e., nodes transmit over the channel in an uncoordinated fashion regardless of other users’ activity, and without retransmissions. No time-slot synchronization is required, reducing the terminal cost and battery consumption. Leaning on the typical assumption of infinite user population, the aggregate channel traffic is modeled by a Poisson distribution of parameter λ [b/s/Hz], or λ = λ / k [pk/s/Hz], with k representing the number of information bits in a data unit.
In order to improve reliability of the transmissions and counteract in part the effect of the channel and multiple access interference, data units are protected with FEC characterized by a Gaussian codebook with code rate R = k / n s [b/sym], where n s is the number of symbols composing a packet. Let us define the packet duration T p and the symbol duration T s , clearly T p = T s n s . The normalized channel load G measured in [pk/pk duration and pk bandwidth] captures the average number of packets transmitted during one data unit duration and per transmission bandwidth W . The normalized channel load is related to λ and λ by:
G = λ R = λ T p W ,
where we assume an ideal pulse shaping filter, i.e., T s = 1 / W .
We consider transmissions over an AWGN channel. The discrete-time received the signal of the packet sent by the u-th user y ( u ) = y 1 , , y n s can be written as:
y ( u ) = x ( u ) + z ( u ) + n .
With z ( u ) being the aggregate multi-user interference over the considered codeword, and n = n 1 , , n n s being the noise vector whose elements are sampled from a zero-mean complex white Gaussian process with variance σ 2 per complex dimension, i.e., n h CN 0 , 2 σ 2 for h = 1 , , n s . We will consider ideal estimate of sampling epoch, frequency and phase offsets, hence x ( u ) = c 1 ( u ) , , c n s ( u ) is the transmitted codeword of user u. Let us denote with P h ( u ) = E | c h ( u ) | 2 the received power of the useful signal for the h-th symbol, with N = 2 σ 2 the noise power and with Z h ( u ) = E | z h ( u ) | 2 the aggregate interference power on symbol h. Then, the signal-to-interference plus noise ratio γ , for the h-th received symbol of the user’s u data unit can be computed as:
γ h ( u ) = P h ( u ) N + Z h ( u ) .
By assuming perfect power control, i.e., all users are received with equal power, we can simplify P h ( u ) = P . Hence, Equation (2) reduces to:
γ h ( u ) = P N + Z h ( u ) .
Remark 1.
Very low-cost IoT terminals will hardly have the capability to adapt their transmission power so as to be received with the same power at the base station or satellite. Nonetheless, IoT will cover a very broad range of scenarios and for some of them terminals may have a more powerful hardware capable of, for example, adapt the transmission power. This is the case for SigFox and LoRa transmitters. In this latter scenario, two ways for providing perfect power control can be foreseen. For very static scenarios (fixed terminals, fixed receiver and static channel) open-loop static power assignment can be utilized. For non-static scenarios closed-loop may be preferred instead. This would be the case for an LEO communication system where providing the same power at the receiver input (the LEO satellite) entails a quite complex algorithm that shall measure the received power, for example via a beacon, and adapt the transmission power accordingly.
We now define the two metrics we will consider throughout the contribution, i.e., packet loss rate (PLR) and spectral efficiency.
Definition 1 (Packet loss rate).
The packet loss rate p l is the probability that a data unit is not correctly received.
Definition 2 (Spectral efficiency).
The spectral efficiency S is the average number of (information) bits correctly received per unit of time and frequency.

2.1. Modelling the Decoding Process

In the classic literature on RA protocols, the destructive collision channel has been used as introductory yet very useful channel model abstraction [51]. Nonetheless, when packets are protected with forward error correction and asynchronous transmissions are allowed, assuming that a packet is lost, even if the vast majority is collision-free, is particularly pessimistic (see discussions in [22]). In the quest for more accurate abstractions of the physical layer that are able to capture the benefit of FEC, several attempts have been made in recent works, e.g., [21,22,23].
Assume that the packet u interfered with j N other packets with an overlap of x h 0 , 1 for h = 1 , , j . By leaning on the approach in [21,52] we will compute the mean of the signal-to-interference and noise ratio (SINR) γ ¯ observed over the generic packet u as:
γ ¯ ( u ) = P N + h = 1 j x h ( u ) P = P N + Z ¯ ( u ) .
Choosing the code rate R , the data unit u is declared as correctly decoded if:
R < log 2 1 + γ ¯ ( u ) .
By recalling the assumption of the Gaussian codebook (hence Gaussianity of the interference), the decoding condition assumes that messages are long enough so that the rate can approach the capacity of the AWGN channel.
Before entering in the details of the packet loss rate and spectral efficiency analysis, we would like to make few observations on the model for successful decoding presented in this Section.

2.2. Discussion on the Model for Successful Decoding

For the analysis of the performance of asynchronous RA protocols, a simple yet insightful abstraction of the physical layer able to capture the relevant tradeoffs has always been key. Few relevant alternatives beyond the selected model have been proposed in the recent past.
Targeting a similar level of precision, we can find the model based on instantaneous mutual information as presented in [22]. Resorting to a parallelism with the block interference channel [53], the authors consider the mutual information carried by each packet symbol, similarly to [54], and compute its average over the entire data unit. The result is compared with the chosen channel code rate and a decision of successful decoding is taken if the rate lies below the computed average mutual information. Similarly to the model chosen for our analysis, the PHY abstraction based on mutual information condenses the multi-dimensional problem of multi-user interference affecting each transmission, that may unfold in an untractable number of subcases, into a one-dimensional comparison of a function of the SINR with the selected code rate R . Compared to the model adopted in our work, the one leaning on mutual information provides more conservative results. In fact, it can be proven via Jensen’s inequality that the right hand side of Equation (3) is always greater than or equal to the right hand side of Equation (7) in [22].
Introducing a higher level of detail would, for example, entail the inclusion of the PLR performance of a code family or a specific channel code. The SINR experienced by each data unit can be used to inspect the PLR performance of the error correcting code, so as to make a decision about whether the packet can be correctly decoded, similar to what was proposed in [26,27,55] although for a time-slotted scenario, or as in [25] for spread spectrum ALOHA. Even though more precise than the adopted PHY abstraction, such approximation still holds similar limitations:
  • the variability of the interference level along the packet is difficult to be captured. In a packet collision, how the multi-user interference hits the packet to be decoded has a fundamental role in determining whether it can be decoded or not. This is a new dimension beyond the total level of interference experienced. Unfortunately also here a function of the SINR is required to make use of the PLR, hence compressing this information in just one single value and losing the time dependance. Let us consider, for example, the simple case in which a packet is collided with a single other by say 50 % . For the considered model this scenario is equivalent to one in which the packet is collided with two other packets, but only with 25 % of its duration. This is because the interference scenario is mapped to a 1-dimensional number which is the average SINR over the packet. Clearly, depending on whether the 25 % of each collision happens on the same portion of the packet or not, a real FEC code may behave drastically differently. In fact, if the 25 % collided is on the same packet portion, this would result in fewer interfered symbols but with a lower SINR. The other case instead would result in more symbols interfered but with a higher SINR;
  • interference is assumed to be Gaussian-like to enable the use of the PLR performance as relevant metric. The Gaussianity of interference is a good approximation when the number of interferers is not too small, or with few interferers whose signals bear imperfections as time-, frequency- and phase-offsets [55].
A further refinement of the decoding procedure would require the choice of an exact channel code together with the decoding algorithm adopted. In this way, full physical layer simulations may be required. This approach goes beyond the scope of this work, which is to provide a flexible and fast tool to investigate relevant tradeoffs for ALOHA with FEC.

3. Packet Loss Rate and Spectral Efficiency Analysis of ALOHA with Forward Error Correction

In this section we elaborate an analytical model able to predict the PLR and the spectral efficiency performance of ALOHA with forward error correction in two different flavors. We start in Section 3.1 by considering a scenario where the transmitted messages are long enough so that the rate can approach the capacity of the AWGN channel. In Section 3.2, taking inspiration by relevant technologies widely adopted in the IoT world like SigFox [47] and LoRaWAN [48] (especially in its latest evolution named LoRa-E [56]), we extend the analysis by considering an ALOHA multiple access scheme, where the transmission bandwidth is smaller than the channel bandwidth and users send their data units uniformly at random within the available channel. In this second scenario we also assume that the transmitted messages are long enough so that the rate can approach the capacity of the AWGN channel with a vanishingly small error probability.

3.1. Forward Error Correction ALOHA

We are now interested in characterizing the average PLR p l of an ALOHA multiple access protocol where packets are protected with a Gaussian codebook of rate R . Denote with J the r.v. representing the number of interferers affecting a transmission. We can compute the average PLR by conditioning on the number of interferers ( J = j ) and then removing the conditioning as:
p l = 1 j = 0 Pr ( u successful | J = j ) Pr ( J = j ) .
Once the packet loss rate is available, i.e., when Equation (4) is solved, the spectral efficiency can be computed following:
S = G ( 1 p l ) .
We denote with p u | j Pr ( u successful | J = j ) . Consider the transmission of the data unit u, the probability of having J = j packets interfering with u is equivalent to the probability that j terminals transmitted over two packet durations. Recall that the aggregate traffic follows a Poisson distribution of intensity G packets per packet duration (see also definition in Equation (1)), hence Equation (4) can be reformulated as:
p l = 1 j = 0 p u | j 2 G j e 2 G j ! .
Let us now investigate p u | j , starting with the case j = 1 , i.e., the packet is interfered with one single other packet.
Case j = 1
To compute p u | 1 we can exploit the successful decoding condition of Equation (3). The probability of user u being decoded given that it was involved in a collision with one other packet is thus:
p u | 1 = Pr R < log 2 1 + γ ¯ ( u ) | J = 1 .
We define the useful quantity normalized average interference power  Z ^ ( u ) as:
Z ^ ( u ) Z ¯ ( u ) P = X 1 ( u ) ,
with X 1 ( u ) being an r.v. capturing the amount of overlap between the interfering packet and the data unit of interest. Clearly, X 1 ( u ) is uniformly distributed within the range 0 , 1 and consequently also Z ^ ( u ) U ( 0 , 1 ) . The probability p u | 1 then becomes:
p u | 1 = Pr R < log 2 1 + γ ¯ ( u ) | J = 1 = Pr Z ^ ( u ) < 1 2 R 1 N P | J = 1 .
Let us denote with F Z ^ ( z ^ ) the cumulative distribution function (CDF) of the uniformly distributed r.v. Z ^ ( u ) . Obviously F Z ^ ( z ^ ) = z ^ . For ease of notation let us also define δ as:
δ 1 2 R 1 N P .
The parameter δ can be interpreted as the minimum interference such that a packet cannot be successfully decoded. We observe that depending on the chosen rate R and on the received signal-to-noise ratio (SNR) P / N , δ may be larger than 1. Nonetheless, the r.v. Z ^ ( u ) has a support in 0 , 1 , therefore we may rewrite p u | 1 as:
p u | 1 = Pr Z ^ ( u ) < δ | J = 1 = F Z ^ min ( δ , 1 ) = min ( δ , 1 ) ,
where min ( δ , 1 ) takes care of confining the evaluation of F Z ^ ( z ^ ) in the support of Z ^ ( u ) . Note that for the case j = 1 the minimum operation is not required, but it will be fundamental in the generalization for j > 1 .
Case j > 1
For reference, we show an example with j = 2 interferers in Figure 1. When the number of interfering packets exceeds one, the normalized average interference power Z ^ ( u ) becomes the sum of j independent uniformly distributed r.v.s in 0 , 1 , i.e.,
Z ^ ( u ) Z ¯ ( u ) P = h = 1 j X h ( u ) with X h ( u ) U ( 0 , 1 ) , h = 1 , , j .
The r.v. X h ( u ) represents the amount of overlap the data unit u has with the h-th interfering packet. We may observe that Z ^ ( u ) follows the Irwin–Hall distribution, hence its CDF can be conveniently expressed as:
F Z ^ ( z ^ ; j ) = 1 j ! l = 0 z ^ ( 1 ) l j l ( z ^ l ) j .
Recalling that F Z ^ ( z ^ ; j ) is the CDF of the r.v. Z ^ ( u ) , the probability that user u is correctly decoded when collided with j other packets is:
p u | j = Pr Z ^ ( u ) < δ | J = j = F Z ^ min ( δ , j ) ; j = 1 j ! l = 0 min ( δ , j ) ( 1 ) l j l ( min ( δ , j ) l ) j .
Remark 2.
Depending on the choice of the rate R and on the received SNR P / N , δ may be larger than j for some values of j N . The minimum operation min ( δ , j ) ensures that the CDF is computed in the support of Z ^ ( u ) , i.e., 0 , j .
Remark 3.
The Irwin–Hall distribution includes as a special case the uniform distribution when j = 1 and the triangular distribution for j = 2 . In fact, when j = 1 ,
F Z ^ ( z ^ ; 1 ) = 1 j ! l = 0 z ^ ( 1 ) l j l ( z ^ l ) j j = 1 = l = 0 z ^ ( 1 ) l 1 l ( z ^ l ) = z ^ ,
for z ^ 0 , 1 , which corresponds to the CDF of a standard uniform r.v.. In this way, Equation (9) includes Equation (7) as a special case for j = 1 .
Thanks to the observation in Remark 2, we can finally compute the packet loss rate p l by substituting Equation (9) in Equation (5) as:
p l = 1 j = 0 p u | j 2 G j e 2 G j ! = 1 j = 0 1 j ! l = 0 min ( δ , j ) ( 1 ) l j l ( min ( δ , j ) l ) j 2 G j e 2 G j ! .

3.2. Forward Error Correction Time and Frequency ALOHA

When transmissions occupy a smaller bandwidth than the channel allocated for the system, the analysis provided in Section 3.1 shall be extended. In particular, we assume that transmissions are asynchronous both in time and frequency, i.e., when a transmission is triggered by the generation of a packet from higher layers, the central frequency is selected uniformly at random within the total channel bandwidth. This access method is especially relevant, as it is adopted by IoT technologies such as SigFox [47] and LoRaWAN (especially in LoRa-e) [48].
Let us define the channel bandwidth as B . We assume that it is much larger than the bandwidth occupied by the transmission of a single packet, i.e., B W , so that border effects can be neglected. Packets close to the limits of the channel bandwidth are subject to a lower level of interference simply because concurrent transmissions are allowed only within the channel band. For example, when packets are transmitted on the minimum frequency within the channel, interference can come from packets at the same frequency or higher, effectively reducing by a factor of two the probability of interference. One could take into considerations this effect following a similar path addressed in [50] and extend the analysis provided in the following.
As in the previous Section, we are interested in characterizing the average PLR p l of an ALOHA multiple access protocol where packets are protected with a Gaussian codebook of rate R . Following a similar path, we can compute the average PLR by conditioning on the number of interferers ( J = j ) and then removing the conditioning as:
p l = 1 j = 0 p u | j Pr ( J = j ) .
With respect to the previous scenario, both p u | j and Pr ( J = j ) have to be re-elaborated taking into account the modified access method. Furthermore, as we compute the packet loss rate by solving Equation (10), the spectral efficiency can be easily derived as follows:
S = G ( 1 p l ) .
Following similar steps discussed in Section 3.1, we define X h ( u ) as the r.v. representing the amount of interference caused by the h-th interferer on data unit u. Differently from the plain ALOHA scenario, the collision may partially happen both in the time and frequency domains. Therefore, X h ( u ) captures the area of the collision between the two data units and hence is modeled as the product of two standard uniform r.v.s U and V (as we consider the power normalization as per Equations (6) and (8)). In this way, we have:
X h ( u ) = U h ( u ) V h ( u ) U h ( u ) U ( 0 , 1 ) , V h ( u ) U ( 0 , 1 ) .
For ease of notation we drop the subscript h and the superscript ( u ) . We can compute the CDF F X ( x ) of X as:
F X ( x ) = Pr ( X x ) = 0 1 Pr V x u f U ( u ) d u = 0 x d u + x 1 x u d u = x x log e ( x ) .
As a consequence, the probability density function (PDF) f X ( x ) of X becomes:
f X ( x ) = log e ( x ) .
Conditioned on J = j interferers, the normalized average interference power follows Z ^ ( u ) = h = 1 j X h ( u ) , similarly to Equation (8), but with the fundamental difference that here the i.i.d. r.v.s X h ( u ) are governed by the PDF in Equation (11). Such important difference is the direct consequence of the modified access scheme, now asynchronous both in time and frequency.
We are interested in computing the CDF of Z ^ ( u ) and we lean on the property of characteristic functions. In particular, since Z ^ ( u ) is the sum of j i.i.d. random variables X h ( u ) , its characteristic function φ Z ^ ( t ) can be written as the product of the characteristic functions φ X h ( u ) ( t ) of X h ( u ) . By applying the definition,
φ X h ( u ) ( t ) = E e i X h ( u ) t = 0 1 e i t x log e ( x ) d x = i ( C i ( t ) i S i ( t ) + log e ( t ) + β ) t ,
with C i ( t ) = t cos ( ω ) ω d ω being the cosine integral, S i ( t ) = t sin ( ω ) ω d ω being the sine integral and β = 1 1 ω + 1 ω d ω being the Euler–Mascheroni constant. Exploiting Equation (12), the characteristic function of Z ^ ( u ) can be easily derived as:
φ Z ^ ( t ) = h = 1 j φ X h ( u ) ( t ) = i ( C i ( t ) i S i ( t ) + log e ( t ) + β ) t j .
Thanks to the Gil–Pelaez theorem, the CDF F Z ^ ( z ^ ; j ) can be derived by the evaluation of the integral,
F Z ^ ( z ^ ; j ) = 1 2 1 π 0 e i t z ^ φ Z ^ ( t ) t d t = 1 2 1 π 0 e i t z ^ t i ( C i ( t ) i S i ( t ) + log e ( t ) + β ) t j d t ,
as a function of the characteristic function φ Z ^ ( t ) defined in (13).
Recalling that the data unit u is protected by a Gaussian channel code of rate R , u can be successfully received if and only if Z ^ ( u ) < δ , i.e., the total of interference (and therefore the overall overlap among interfering packets with u) does not exceed δ . In particular, the probability that user u is correctly decoded when colliding with j other packets is:
p u | j = Pr Z ^ ( u ) < δ | J = j = F Z ^ min ( δ , j ) ; j = 1 2 1 π 0 e i t min ( δ , j ) t i ( C i ( t ) i S i ( t ) + log e ( t ) + β ) t j d t .
Observing the transmission of the generic packet u between τ ( u ) and τ ( u ) + T p and in the band ψ ( u ) , ψ ( u ) W as depicted in Figure 2, the probability that J = j interfering packets clash with the data unit of interest is equivalent to the probability that j packets are transmitted in the area 4 T p W (shaded blue area in Figure 2). Recalling that the aggregate traffic is modeled following a Poisson distribution of intensity λ [pk/s/Hz] we can write:
Pr ( J = j ) = ( 4 λ T p W ) j e ( 4 λ T p W ) j ! = ( 4 G ) j e ( 4 G ) j ! ,
by leaning on the definition of G in Equation (1).
Finally, substituting Equations (14) and (15) in Equation (10) we get:
p l = 1 j = 0 1 2 1 π 0 e i t min ( δ , j ) t i ( C i ( t ) i S i ( t ) + log e ( t ) + β ) t j d t · ( 4 G ) j e ( 4 G ) j ! .

4. Numerical Results

In this Section we discuss numerical results of practical interest leaning on the derived analytical expressions of the packet loss rate and spectral efficiency found in Section 3.1 and Section 3.2.
We start by considering an ALOHA scenario where packets are protected with a Gaussian codebook of rate R = 1 bits per symbol. Recall that packets are adopting perfect power control, and we let the P / N vary in the range 0 , 5 , 10 , 20 dB. In Figure 3, we report the spectral efficiency (Figure 3a) and the packet loss rate (Figure 3b) for the aforementioned setting. When P / N = 0 dB, δ = 1 1 = 0 . Recall that δ is the maximum amount of normalized interference that can be counteracted by the error correcting code still enabling the correct reception of the data unit. Hence, when δ = 0 we are under the destructive collision assumption: every collision will cause a packet to be lost no matter how small the overlap. Inspecting both the spectral efficiency and packet loss rate, we can observe how the model is properly capturing this special case and reflects the throughput and packet loss rate of a classic ALOHA protocol. As one can expect, when we increase P / N beyond 0 dB the error correcting code is able to counteract an increasing level of interference which translates in an improved performance of the packet loss rate and spectral efficiency. Nonetheless, the highest performance gain is reaped by the increase of SNR from 0 dB to 5 dB, where the peak spectral efficiency is more than doubled ( 0.396 [b/s/Hz] vs. 0.184 [b/s/Hz]) and a target PLR of 10 1 is achieved for almost three times the channel load ( 0.16 [b/s/Hz] vs. 0.06 [b/s/Hz]). Instead, a more stringent PLR of 10 2 is achieved for 0.02 [b/s/Hz] vs. <0.01 [b/s/Hz], more than a two-fold improvement. Comparing the P / N scenario of 5 dB with 10 dB, the performance gain is more limited, and is reduced even more when confronting the 10 dB with the 20 dB. In order to show how the analytical prediction is exact, we validated two performance curves, 5 dB and 20 dB, with Monte Carlo simulations, that adopt the same model for the successful decoding of packets as assumed by the analysis.
In the second set of results, time and frequency ALOHA is investigated. Results are reported in Figure 4 for both spectral efficiency and packet loss rate (Figure 4a,b, respectively). Similarly to the ALOHA scenario, packets are protected with a Gaussian codebook of rate R = 1 bits per symbol and we let the P / N vary in the range 0 , 5 , 10 , 20 dB. Additionally, the channel bandwidth to transmission bandwidth is selected to be B / W = 500 so that border effects can be neglected. As in the previous case P / N = 0 dB corresponds to the destructive collision channel setup. Increasing the SNR allows the error correcting code to counteract some level of interference benefitting both packet loss rate and spectral efficiency. A very remarkable performance improvement can be already observed when considering the scenario P / N = 5 dB. More than a four-fold increase in the peak spectral efficiency is observed ( 0.390 [b/s/Hz] vs. 0.093 [b/s/Hz]) and a target PLR of 10 1 is achieved for almost eight times the channel load ( 0.23 [b/s/Hz] vs. 0.03 [b/s/Hz]). Instead, a more stringent PLR of 10 2 is achieved for 0.04 [b/s/Hz] vs. 0.01 [b/s/Hz], more than a four-fold improvement. The outstanding performance improvement can be ascribed to the effect of forward error correction coupled with the access policy. In fact, when transmissions are asynchronous both in time and frequency, the probability that two or more packets collide increases with respect to the case in which transmissions occupy fully the channel bandwidth, under an equivalent channel load λ . On the other hand, the average overlap per packet collision is reduced by half. On average, a packet collision may involve half of the time duration and half of the frequency duration of a packet when time and frequency ALOHA is considered. These two effects partially compensate each other and when forward error correction is introduced, the time and frequency ALOHA policy largely benefits.
In order to compare the behavior of time and frequency ALOHA with ALOHA both aided by forward error correction we collect a subset of the previous results in Figure 5. The configuration is as before—packets are protected with a Gaussian codebook of rate R = 1 bits per symbol and we let the P / N vary in the range 0 , 5 , 20 dB. Additionally, the channel bandwidth to transmission bandwidth is selected to be B / W = 500 so that border effects can be neglected. As expected, when the destructive collision channel scenario is considered, i.e., P / N = 0 dB, ALOHA is able to largely outperform time and frequency ALOHA. However, when the presence of FEC can partially counteract the multi-access interference, the performance of time and frequency ALOHA are enhanced to competitive levels compared to ALOHA. Not only the peak spectral efficiency is now comparable for both P / N = 5 dB and P / N = 20 dB, but also for low to moderate channel loads the packet loss rate is outperforming the ALOHA policy. For example, a target PLR of 10 2 is achieved for two times the channel load ( 0.04 [b/s/Hz] vs. 0.02 [b/s/Hz]) in time frequency ALOHA w.r.t. to ALOHA for P / N = 5 dB and the target PLR of 10 1 is achieved for a 44 % larger channel load ( 0.23 [b/s/Hz] vs. 0.16 [b/s/Hz]). Similarly at P / N = 20 dB, a target PLR of 10 2 is achieved for a 30 % larger channel load ( 0.13 [b/s/Hz] vs. 0.10 [b/s/Hz]) and the target PLR of 10 1 is achieved for a 11 % larger channel load ( 0.41 [b/s/Hz] vs. 0.37 [b/s/Hz]). The remarkable performance improvement can be identified in two counterbalancing effects. Fixing the channel load, the probability that k users collide is larger for time and frequency ALOHA compared to ALOHA. On the other hand for a fixed number of interferers the probability that the level of interference is smaller or equal than a certain value is always larger in the former case. Hence, these two effects are influencing the performance in two opposite directions, the first is worsening the packet loss rate (higher number of interferers) while the second is improving it (lower level of interference). As a remark, it is important to stress that an ALOHA system operated in time and frequency aided with forward error correction provides a better performance for all channel load values of practical interest, as we observed by pointing to possible target PLR with respect to an ALOHA policy. This is in contrast with what is known from existing literature when the destructive collision channel model is considered. The protecting effect of channel coding also against multi-user interference is indeed particularly beneficial.
The analytical analysis of time and frequency ALOHA assumes that the channel bandwidth to transmission bandwidth ratio is large enough so that border effects can be neglected, i.e., B / W . We already observed that for B / W = 500 such assumption holds true and numerical results are perfectly predicted by the analysis, as observed in Figure 5. To answer the practical question on what is the smallest value of the ration B / W for which border effects can be neglected, we performed extensive numerical simulations and the results are reported in Figure 6 for both the packet loss rate and the spectral efficiency. While reducing the B / W down to 50 has a very limited impact on the performance, and hence can be still very well predicted with the presented analytical model, a further reduction to 10 shows the first visible differences. Below B / W = 10 the spectral efficiency reduction becomes particularly visible and the analytical model starts to become loose w.r.t. the numerical results. The peak spectral efficiency is reduced from 0.39 [b/s/Hz] to 0.3 [b/s/Hz] when B / W = 2 and the spectral efficiency is largely overestimated for all channel load values beyond the peak spectral efficiency. Similarly, the PLR is visibly worse than the predicted analytical performance for all channel load values. Hence, below B / W = 50 , the analytical model shall be extended to take into account the border effects, if a better performance estimate is required. Similar arguments as presented in [50] can be exploited to include this effect in the packet loss rate analysis.
Finally, we report in Figure 7 the possible performance improvement of a time and frequency ALOHA system similar to SigFox when forward error correction is enabled. In SigFox, packets are transmitted uncoded over a very narrow transmission band of only W = 100 Hz, asynchronous both in time and frequency. The total available band (channel bandwidth) is instead B = 200 kHz resulting in a B / W = 2000 . We choose as packet duration the maximum available payload of 12 bytes, i.e., k = 96 bits. We compare this uncoded scenario with a system employing forward error correction with rate R = 1 [b/sym], emulating the possible choice of quadrature phase shift keying (QPSK) modulation coupled with a channel code rate 1 / 2 (recall that the rate R used in the entire manuscript always considers the effect of modulation and channel code combined, as it is measured in bits per symbol). We assume the return uplink of a LEO satellite communication system in the 860 MHz industrial scientifical and medical (ISM) band, with a satellite flying at 575 km, a maximum effecive isotropic radiated power (EIRP) of 16 dBmW and a G/T of 22 dBi/K. An SNR between 18 and 22 dB could be achieved at the satellite for terminals at 40 ° and 90 ° elevation angle respectively. We consider a simple clear sky AWGN channel with no additional losses (antenna losses, atmospheric losses, terminal losses etc. are all considered to be negligible). Finally, no geometry of the link is taken into account, i.e., perfect power control is considered so that the received power at the satellite antenna input is the same for every transmission. Clearly this is a simplified satellite setting, nonetheless it can shed light on the possible gain one could expect if forward error correction is adopted. Analytical results are collected in Figure 7 for both the spectral efficiency, Figure 7a and packet loss rate, Figure 7b. Differently from previous results, here we are concerned with the number of packets per hour, denoted with [pk/h] in the figures, that can be served by the system. This measure is more suited for system design, since it can be easily adapted to the IoT use case at hand. Typically, an IoT system is designed assuming terminals reporting data a given amount of times per day. Three set of curves are presented, two consider R = 1 and P / N = 10 dB and P / N = 20 dB, while the last curve (green and denoted by coll. ch. in the plots) is for an uncoded system. Looking at Figure 7a for an SNR of 10 dB, a five fold increase in the peak of spectral efficiency can be achieved compared to an uncoded system, reaching up to 3.75 · 10 6 [pk/h]. Even more, for a target packet loss rate of 10 1 more than ten times the aggregate channel traffic can be supported when forward error correction is present compared to the uncoded system. Finally, for a more stringent PLR constraint of 10 2 up to 7.5 · 10 5 [pk/h] and 10 6 [pk/h] can be supported for P / N = 10 dB and P / N = 20 dB, respectively.

5. Conclusions and Outlook

We have studied the effect of forward error correction (FEC) on the performance of two random access systems: ALOHA, where the channel bandwidth is confined to the transmission bandwidth, and ALOHA in time and frequency, where the channel bandwidth is instead much larger. A mathematical model that can accurately predict the packet loss rate and the spectral efficiency of said systems has been developed and validated via Monte Carlo simulations. The analysis yielded valuable and yet unexplored insights. In particular, we have observed that the use of FEC can be more beneficial to a time and frequency ALOHA policy rather than ALOHA. When the destructive collision channel is concerned, ALOHA is able to largely outperform time and frequency ALOHA. Instead, when FEC is adopted, comparable results in terms of both packet loss rate and spectral efficiency can be achieved. Furthermore, bandwidth border effects have been studied under various channel-to-transmission bandwidth ratios. Our model accurately predicts packet loss rates and spectral efficiencies for ratios greater than 50, which are typically to be found in real systems. Finally, we have shown that SigFox-like systems targeting the return uplink of satellite communication systems can greatly benefit from the use of FEC, thus achieving a multi-fold increase of the spectral efficiency for practical operational settings.
The present contribution aims at stimulating relevant work along this line of research. Several relevant open questions remain, for example, the extension of the analysis to fading channels, or to the use of optimized transmission power unbalance among terminals, which is expected to leverage the capture effect. Additionally, there is the possibility to include the border effects in the analysis so as to be able to cope with small B / W , or to analyze other relevant access policies such as diversity ALOHA with FEC.

Author Contributions

Conceptualization, F.C. and M.G.; methodology, F.C. and M.G.; software, F.C. and M.G.; validation, F.C. and M.G.; formal analysis, F.C.; investigation, F.C. and M.G.; resources, F.C.; data curation, F.C. and M.G.; writing—original draft preparation, F.C. and M.G.; writing—review and editing, F.C. and M.G.; visualization, F.C. and M.G.; supervision, F.C. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge the financial support by the Federal Ministry of Education and Research of Germany in the programme of “Souverän. Digital. Vernetzt.” Joint project 6G-RIC, project identification number: 16KISK022.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Villa-Henriksen, A.; Edwards, G.T.C.; Pesonen, L.A.; Green, O.; Sorensen, C.A.G. Internet of Things in arable farming: Implementation, applications, challanges and potential. Biosyst. Eng. 2020, 191, 60–84. [Google Scholar] [CrossRef]
  2. Aceto, G.; Persico, V.; Pescapé, A. A Survey on Information and Communication Technologies for Industry 4.0: State-of-the-Art, Taxonomies, Perspectives, and Challenges. IEEE Commun. Surv. Tuts. 2019, 21, 3467–3501. [Google Scholar] [CrossRef]
  3. Saleem, Y.; Crespi, N.; Rehmani, M.H.; Copeland, R. Internet of Things-Aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions. IEEE Access 2019, 7, 62962–63003. [Google Scholar] [CrossRef]
  4. Salam, A. Internet of Things for Sustainable Community Development; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  5. Centenaro, M.; Vangelista, L.; Zanella, A.; Zorzi, M. Long-Range Communications in Unlicensed Bands: The Rising Stars in the IoT and Smart City Scenarios. IEEE Wirel. Commun. 2016, 23, 60–67. [Google Scholar] [CrossRef] [Green Version]
  6. Liva, G.; Gaudio, L.; Ninacs, T.; Jerkovits, T. Code Design for Short Blocks: A Survey. In Proceedings of the EuCNC 2016, Fantastic 5G Workshop, Athens, Greece, 27–30 June 2016. [Google Scholar]
  7. Clazzer, F.; Munari, A.; Liva, G.; Lazaro, F.; Stevanovic, C.; Popovski, P. From 5G to 6G: Has the Time for Modern Random Access Come? In Proceedings of the 6G Wireless Summit, Oulu, Finland, 24–26 March 2019; pp. 1–2. [Google Scholar]
  8. Abramson, N. The ALOHA System - Another Alternative for Computer Communications. In Proceedings of the 1970 Fall Joint Computer Conference, AFIPS’70, Houston, TX, USA, 17–19 November 1970. [Google Scholar]
  9. Roberts, L.G. ALOHA packet systems with and without slots and capture. ACM SIGCOMM Comput. Commun. Rev. 1975, 5, 28–42. [Google Scholar] [CrossRef]
  10. Choudhury, G.; Rappaport, S. Diversity ALOHA—A Random Access Scheme for Satellite Communications. IEEE Trans. Commun. 1983, 31, 450–457. [Google Scholar] [CrossRef]
  11. Casini, E.; De Gaudenzi, R.; del Rio Herrero, O. Contention Resolution Diversity Slotted ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks. IEEE Trans. Wirel. Commun. 2007, 6, 1408–1419. [Google Scholar] [CrossRef]
  12. Berioli, M.; Cocco, G.; Liva, G.; Munari, A. Modern Random Access Protocols; NOW Publisher: Delft, The Netherlands, 2016. [Google Scholar]
  13. Liva, G. Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA. IEEE Trans. Commun. 2011, 59, 477–487. [Google Scholar] [CrossRef]
  14. Paolini, E.; Liva, G.; Chiani, M. Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access. IEEE Trans. Inf. Theory 2015, 61, 6815–6832. [Google Scholar] [CrossRef] [Green Version]
  15. Sandgren, E.; Graell i Amat, A.; Brännström, F. On Frame Asynchronous Coded Slotted ALOHA: Asymptotic, Finite Length, and Delay Analysis. IEEE Trans. Commun. 2017, 65, 691–703. [Google Scholar] [CrossRef] [Green Version]
  16. Richardson, T.; Shokrollahi, M.; Urbanke, R. Design of Capacity-Approaching Irregular Low-Density Parity-Check Codes. IEEE Trans. Inf. Theory 2001, 47, 619–637. [Google Scholar] [CrossRef] [Green Version]
  17. Narayanan, K.; Pfister, H. Iterative Collision Resolution for Slotted ALOHA: An Optimal Uncoordinated Transmission Policy. In Proceedings of the 2012 IEEE International Symposium on Turbo Codes and Iterative Information Processing (ISTC), Gothenburg, Sweden, 27–31 August 2012. [Google Scholar]
  18. Yu, Y.; Giannakis, G.B. High-Throughput Random Access Using Successive Interference Cancellation in a Tree Algorithm. IEEE Trans. Inf. Theory 2007, 53, 4628–4639. [Google Scholar] [CrossRef]
  19. Stefanovic, C.; Popovski, P. ALOHA Random Access that Operates as a Rateless Code. IEEE Trans. Commun. 2013, 61, 4653–4662. [Google Scholar] [CrossRef] [Green Version]
  20. Capetanakis, J.I. Tree Algorithms for Packet Broadcast Channels. IEEE Trans. Inf. Theory 1979, 25, 505–515. [Google Scholar] [CrossRef]
  21. Kissling, C. Performance Enhancements for Asynchronous Random Access Protocols over Satellite. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011. [Google Scholar]
  22. Clazzer, F.; Kissling, C.; Marchese, M. Enhancing Contention Resolution ALOHA using Combining Techniques. IEEE Trans. Commun. 2018, 66, 2576–2587. [Google Scholar] [CrossRef] [Green Version]
  23. De Gaudenzi, R.; del Rio Herrero, O.; Acar, G.; Barrabes, E.G. Asynchronous Contention Resolution Diversity ALOHA: Making CRDSA Truly Asynchronous. IEEE Trans. Wirel. Commun. 2014, 13, 6193–6206. [Google Scholar] [CrossRef]
  24. Del Rio Herrero, O.; De Gaudenzi, R. High Efficiency Satellite Multiple Access Scheme for Machine-to-Machine Communications. IEEE Trans. Aerosp. Electron. Syst. 2012, 48, 2961–2989. [Google Scholar] [CrossRef]
  25. Collard, F.; De Gaudenzi, R. On the Optimum Packet Power Distribution for Spread Aloha Packet Detectors With Iterative Successive Interference Cancellation. IEEE Trans. Wirel. Commun. 2014, 13, 6783–6794. [Google Scholar] [CrossRef]
  26. Mengali, A.; De Gaudenzi, R.; Arapoglou, P.D. Enhancing the Physical Layer of Contention Resolution Diversity Slotted ALOHA. IEEE Trans. Wirel. Commun. 2017, 65, 4295–4308. [Google Scholar] [CrossRef]
  27. Mengali, A.; De Gaudenzi, R.; Stefanovic, C. On the Modeling and Performance Assessment of Random Access with SIC. IEEE J. Sel. Areas Commun. 2018, 36, 292–303. [Google Scholar] [CrossRef] [Green Version]
  28. Polyanskiy, Y. A Perspecitve on Massive Random-Access. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 2523–2527. [Google Scholar]
  29. Zadik, I.; Polyanskiy, Y.; Thrampoulidis, C. Improved Bounds on Gaussian MAC and Sparse Regression via Guassian Inequalities. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Maison de la Mutualité, France, 7–12 July 2019; pp. 430–434. [Google Scholar]
  30. Calderbank, R.; Thompson, A. CHIRRUP: A Practical Algorithm for Unsourced Multiple Access. Inf. Inference J. IMA 2019, 9, 875–897. [Google Scholar] [CrossRef] [Green Version]
  31. Vem, A.; Narayanan, K.R.; Chamberland, J.F.; Cheng, J. A User-Independent Successive Interference Cancellation Based Coding Scheme for the Unsourced Random Access Gaussian Channel. IEEE Trans. Commun. 2019, 67, 8258–8272. [Google Scholar] [CrossRef]
  32. Amalladinne, V.K.; Chamberland, J.F.; Narayanan, K.R. A Coded Compressed Sensing Scheme for Unsourced Multiple Access. IEEE Trans. Inf. Theory 2020, 66, 6509–6533. [Google Scholar] [CrossRef]
  33. Truhcachev, D.; Bashir, M.; Karami, A.; Nassaji, E. Low-Complexity Coding and Spreading for the Unsourced Random Access. IEEE Commun. Lett. 2021, 25, 774–778. [Google Scholar] [CrossRef]
  34. Fengler, A.; Jung, P.; Caire, G. SPARCs and AMP for Unsourced Random Access. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Maison de la Mutualité, France, 7–12 July 2019; pp. 2843–2847. [Google Scholar]
  35. Fengler, A.; Jung, P.; Caire, G. SPARCs for Unsourced Random Access. IEEE Trans. Inf. Theory 2021, 67, 6894–6915. [Google Scholar] [CrossRef]
  36. Amalladinne, V.K.; Pradhan, A.K.; Rush, C.; Chamberland, J.F.; Narayanan, K.R. Unsourced Random Access with Coded Compressed Sensing: Integrating AMP and Belief Propagation. IEEE Trans. Inf. Theory 2022, 68, 2384–2409. [Google Scholar] [CrossRef]
  37. Romanov, E.; Ordentlich, O. On Compressed Sensing of Binary Signals for the Unsourced Random Access Channel. Entropy 2021, 23, 605. [Google Scholar] [CrossRef]
  38. Ordentlich, O.; Polyanskiy, Y. Low Complexity Scheme for the Random Access Gaussian Channel. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 2528–2532. [Google Scholar]
  39. Andreev, K.; Marshakov, E.; Frolov, A. A Polar Code Based TIN-SIC Scheme for the Unsourced Random Access in the Quasi-Static Fading MAC. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 3019–3024. [Google Scholar]
  40. Pradhan, A.K.; Amalladinne, V.; Narayanan, K.R.; Chamberland, J.F. Polar Coding and Random Spreading for Unsourced Multiple Access. In Proceedings of the IEEE International Conference on Communications (ICC), Xiamen, China, 28–30 July 2021; pp. 1–6. [Google Scholar]
  41. Zheng, M.; Wu, Y.; Zhang, W. Polar Coding and Sparse Spreading for Massive Unsourced Random Access. In Proceedings of the IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–5. [Google Scholar]
  42. Kohran Tanc, A.; Duman, T.M. Massive Random Access with Trellis-Based Codes and Random Signatures. IEEE Commun. Lett. 2021, 25, 1496–1499. [Google Scholar] [CrossRef]
  43. Pradhan, A.K.; Amalladinne, V.K.; Narayanan, K.R.; Chamberland, J.F. LDPC Codes with Soft Interference Cancellation for Uncoordinated Unsourced Multiple Access. In Proceedings of the IEEE International Conference on Communications (ICC), Virtual, 14–23 June 2021. [Google Scholar]
  44. Han, Z.; Yuan, X.; Xu, C.; Jiang, S.; Wang, X. Sparse Kroenecker-Product Coding for Unsourced Multiple Access. IEEE Wirel. Commun. Lett. 2021, 10, 2274–2278. [Google Scholar] [CrossRef]
  45. Ahmadi, M.J.; Duman, T.M. Random Spreading for Unsourced MAC with Power Diversity. IEEE Commun. Lett. 2021, 25, 3995–3999. [Google Scholar] [CrossRef]
  46. Lien, S.Y.; Shieh, S.L.; Huang, Y.; Su, B.; Hsu, Y.L.; Wei, H.Y. 5G New Radio: Waveform, Frame Structure, Multiple Access, and Initial Access. IEEE Commun. Mag. 2017, 55, 64–71. [Google Scholar] [CrossRef]
  47. Sigfox. SIGFOX: The Global Communications Service Provider for the Internet of Things. Available online: www.sigfox.com (accessed on 10 May 2022).
  48. LoRa Alliance. The LoRa Alliance Wide Area Networks for Internet of Things. Available online: www.lora-alliance.org (accessed on 10 May 2022).
  49. Goursaud, C.; Mo, Y. Random unslotted time-frequency ALOHA: Theory and application to IoT UNB networks. In Proceedings of the 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 16–18 May 2016; pp. 1–5. [Google Scholar]
  50. Almonacid, V.; Franck, L. Throughput Performance of Time- and Frequency-Asynchronous ALOHA. In Proceedings of the 11th International ITG Conference on Systems, Communications and Coding (SCC), Hamburg, Germany, 6–9 February 2017; pp. 1–6. [Google Scholar]
  51. Abramson, N. The Throughput of Packet Broadcasting Channels. IEEE Trans. Commun. 1977, COM-25, 117–128. [Google Scholar] [CrossRef] [Green Version]
  52. Clazzer, F.; Kissling, C. Enhanced Contention Resolution ALOHA—ECRA. In Proceedings of the 9th International ITG Conference on Systems, Communication and Coding, Hamburg, Germany, 21–24 January 2013; pp. 1–6. [Google Scholar]
  53. McEliece, R.J.; Stark, W.E. Channels with Block Interference. IEEE Trans. Inf. Theory 1984, IT-30, 44–53. [Google Scholar] [CrossRef]
  54. Thomas, G. Capacity of the Wireless Packet Collision Channel With Feedback. IEEE Trans. Inf. Theory 2000, 46, 1141–1144. [Google Scholar] [CrossRef]
  55. Del Rio Herrero, O.; de Gaudenzi, R. Generalized Analytical Framework for the Performance Assessment of Slotted Random Access Protocols. IEEE Trans. Wirel. Commun. 2014, 13, 809–821. [Google Scholar] [CrossRef]
  56. Boquet, G.; Tuset-Peiró, P.; Adelantado, F.; Watteyne, T.; Vilajosana, X. LoRa-E: Overview and Performance Analysis. IEEE Commun. Mag. 2020, hal-03115551. [Google Scholar]
Figure 1. Example of a collision with two other packets, i.e., j = 2 . In this case we have X 1 ( u ) = x 1 ( u ) , X 2 ( u ) = x 2 ( u ) , and Z ^ ( u ) = x 1 ( u ) + x 2 ( u ) . In general, the start of any packet in the range τ 0 T p , τ 0 + T p , represented by the shaded blue area, would cause a collision with the data unit of user u.
Figure 1. Example of a collision with two other packets, i.e., j = 2 . In this case we have X 1 ( u ) = x 1 ( u ) , X 2 ( u ) = x 2 ( u ) , and Z ^ ( u ) = x 1 ( u ) + x 2 ( u ) . In general, the start of any packet in the range τ 0 T p , τ 0 + T p , represented by the shaded blue area, would cause a collision with the data unit of user u.
Sensors 22 03741 g001
Figure 2. Time and frequency ALOHA, example of a collision with two other packets, i.e., j = 2 . In this case we have X 1 ( u ) = x 1 ( u ) , X 2 ( u ) = x 2 ( u ) , and Z ^ ( u ) = x 1 ( u ) + x 2 ( u ) . In general, the start of any packet in the range τ ( u ) T p , τ ( u ) + T p and ψ ( u ) W , ψ ( u ) + W , represented by the shaded blue area, would cause a collision with the data unit of user u.
Figure 2. Time and frequency ALOHA, example of a collision with two other packets, i.e., j = 2 . In this case we have X 1 ( u ) = x 1 ( u ) , X 2 ( u ) = x 2 ( u ) , and Z ^ ( u ) = x 1 ( u ) + x 2 ( u ) . In general, the start of any packet in the range τ ( u ) T p , τ ( u ) + T p and ψ ( u ) W , ψ ( u ) + W , represented by the shaded blue area, would cause a collision with the data unit of user u.
Sensors 22 03741 g002
Figure 3. Performance of ALOHA with forward error correction. Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR in the range P / N 0 , 5 , 10 , 20 dB. Analytical results (continuous lines) are compared with Monte Carlo simulations (dots). (a) Spectral efficiency; (b) Packet loss rate.
Figure 3. Performance of ALOHA with forward error correction. Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR in the range P / N 0 , 5 , 10 , 20 dB. Analytical results (continuous lines) are compared with Monte Carlo simulations (dots). (a) Spectral efficiency; (b) Packet loss rate.
Sensors 22 03741 g003
Figure 4. Performance of time and frequency ALOHA with forward error correction. The channel bandwidth to transmission bandwidth ratio is B / W = 500 . Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR in the range P / N 0 , 5 , 10 , 20 dB. Analytical results (continuous lines) are compared with Monte Carlo simulations (dots). (a) Spectral efficiency; (b) Packet loss rate.
Figure 4. Performance of time and frequency ALOHA with forward error correction. The channel bandwidth to transmission bandwidth ratio is B / W = 500 . Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR in the range P / N 0 , 5 , 10 , 20 dB. Analytical results (continuous lines) are compared with Monte Carlo simulations (dots). (a) Spectral efficiency; (b) Packet loss rate.
Sensors 22 03741 g004
Figure 5. Performance of time and frequency ALOHA (dashed lines) compared with ALOHA (solid lines) both aided by forward error correction. The channel bandwidth to transmission bandwidth ratio is B / W = 500 for time frequency ALOHA. Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR in the range P / N 0 , 5 , 20 dB. (a) Spectral efficiency. (b) Packet loss rate.
Figure 5. Performance of time and frequency ALOHA (dashed lines) compared with ALOHA (solid lines) both aided by forward error correction. The channel bandwidth to transmission bandwidth ratio is B / W = 500 for time frequency ALOHA. Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR in the range P / N 0 , 5 , 20 dB. (a) Spectral efficiency. (b) Packet loss rate.
Sensors 22 03741 g005
Figure 6. Performance of time and frequency ALOHA aided by forward error correction for various channel bandwidth to transmission bandwidth ratios. The channel bandwidth to transmission bandwidth ratio is in the range B / W = { 500 , 50 , 10 , 5 , 2 } . Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR of P / N = 5 dB. Similar trends have been observed also for other values of SNR not reported in the figure. (a) Spectral efficiency. (b) Packet loss rate.
Figure 6. Performance of time and frequency ALOHA aided by forward error correction for various channel bandwidth to transmission bandwidth ratios. The channel bandwidth to transmission bandwidth ratio is in the range B / W = { 500 , 50 , 10 , 5 , 2 } . Data units are protected with a Gaussian codebook of rate R = 1 bits per symbol. We select the SNR of P / N = 5 dB. Similar trends have been observed also for other values of SNR not reported in the figure. (a) Spectral efficiency. (b) Packet loss rate.
Sensors 22 03741 g006
Figure 7. We consider a system similar to SigFox and we compare uncoded transmissions with data protected with forward error correction. We assume the return uplink of an LEO satellite communication system in the 860 MHz ISM band, with a satellite flying at 575 km, a maximum EIRP of 16 dBmW and a G/T of 22 dBi/K. An SNR between 18 and 22 dB could be achieve at the satellite for terminals at 40 ° and 90 ° elevation angle respectively. Hence, to be conservative we present results for P / N = 10 dB and P / N = 20 dB and for the uncoded case. The transmission band is W = 100 Hz, and packets are sent asynchronous both in time and frequency. The total available band (channel bandwidth) is B = 200 kHz resulting in a B / W = 2000 . The packet duration coincides with the maximum available payload of SigFox, i.e., 12 bytes or k = 96 bits. We compare this uncoded scenario with a system employing forward error correction with rate R = 1 , emulating the possible choice of QPSK modulation coupled with a code rate 1 / 2 channel code. (a) Spectral efficiency. (b) Packet loss rate.
Figure 7. We consider a system similar to SigFox and we compare uncoded transmissions with data protected with forward error correction. We assume the return uplink of an LEO satellite communication system in the 860 MHz ISM band, with a satellite flying at 575 km, a maximum EIRP of 16 dBmW and a G/T of 22 dBi/K. An SNR between 18 and 22 dB could be achieve at the satellite for terminals at 40 ° and 90 ° elevation angle respectively. Hence, to be conservative we present results for P / N = 10 dB and P / N = 20 dB and for the uncoded case. The transmission band is W = 100 Hz, and packets are sent asynchronous both in time and frequency. The total available band (channel bandwidth) is B = 200 kHz resulting in a B / W = 2000 . The packet duration coincides with the maximum available payload of SigFox, i.e., 12 bytes or k = 96 bits. We compare this uncoded scenario with a system employing forward error correction with rate R = 1 , emulating the possible choice of QPSK modulation coupled with a code rate 1 / 2 channel code. (a) Spectral efficiency. (b) Packet loss rate.
Sensors 22 03741 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Clazzer, F.; Grec, M. Analytical Model of ALOHA and Time- and Frequency-Asynchronous ALOHA with Forward Error Correction for IoT Systems. Sensors 2022, 22, 3741. https://doi.org/10.3390/s22103741

AMA Style

Clazzer F, Grec M. Analytical Model of ALOHA and Time- and Frequency-Asynchronous ALOHA with Forward Error Correction for IoT Systems. Sensors. 2022; 22(10):3741. https://doi.org/10.3390/s22103741

Chicago/Turabian Style

Clazzer, Federico, and Marcel Grec. 2022. "Analytical Model of ALOHA and Time- and Frequency-Asynchronous ALOHA with Forward Error Correction for IoT Systems" Sensors 22, no. 10: 3741. https://doi.org/10.3390/s22103741

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop